Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
61s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
10/07/2021, 10:36
Static task
static1
Behavioral task
behavioral1
Sample
8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe
Resource
win10v20210410
General
-
Target
8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe
-
Size
144KB
-
MD5
89895cf4c88f13e5797aab63dddf1078
-
SHA1
1efc175983a17bd6c562fe7b054045d6dcb341e5
-
SHA256
8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a
-
SHA512
d238fa264ad931ed43798a65f01cbe1d044300dbe5312bdcef8540f2757079514daae27f30f2369b7b811a3273c961f9fd38e7ae5010c11120c83906e8c102e2
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\RyukReadMe.html
ryuk
http://rk2zzyh63g5avvii4irkhymha3irblchdfj7prk6zwy23f6kahidkpqd.onion
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 3 IoCs
pid Process 1468 1073r.exe 520 ATICfQfcDlan.exe 928 OqdxPrOLTlan.exe -
Loads dropped DLL 6 IoCs
pid Process 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 1552 icacls.exe 1632 icacls.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\Y: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\X: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\U: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\R: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\O: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\F: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\Z: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\I: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\W: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\T: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\Q: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\M: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\H: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\G: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\J: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\V: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\S: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\P: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\N: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\L: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened (read-only) \??\K: 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\cs.txt 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationUp_SelectionSubpicture.png 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_glass_Thumbnail.bmp 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\jfr\RyukReadMe.html 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\fonts\LucidaSansRegular.ttf 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\RyukReadMe.html 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\tipresx.dll.mui 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\RyukReadMe.html 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\NavigationLeft_SelectionSubpicture.png 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\specialoccasion.png 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\RyukReadMe.html 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\TipBand.dll.mui 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\NavigationLeft_ButtonGraphic.png 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Music.emf 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\RyukReadMe.html 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Common Files\Services\verisign.bmp 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\DismountUnlock.dib 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainBackground.wmv 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\NextMenuButtonIcon.png 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\16_9-frame-image-inset.png 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Goose_Bay 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\7-Zip\Lang\ps.txt 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyScenesBackground_PAL.wmv 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\NavigationRight_ButtonGraphic.png 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\Ushuaia 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Hermosillo 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\7-Zip\History.txt 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Garden.jpg 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\whitemask1047.png 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Internet Explorer\Timeline.cpu.xml 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbytools.jar 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\management\jmxremote.access 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\meta-index 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\HideTest.mp2v 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Bissau 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\ClearAssert.jpg 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Common Files\System\msadc\adcjavas.inc 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationLeft_ButtonGraphic.png 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\shadowonlyframe_buttongraphic.png 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\selection_subpicture.png 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derby.jar 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Asuncion 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\NavigationLeft_ButtonGraphic.png 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Scenes_LOOP_BG_PAL.wmv 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\7-Zip\Lang\en.ttt 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\SoftBlue.jpg 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\curtains.png 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\photoedge_selectionsubpicture.png 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\RyukReadMe.html 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Dawson_Creek 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DissolveNoise.png 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\RyukReadMe.html 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\RyukReadMe.html 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsfra.xml 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\RyukReadMe.html 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\RyukReadMe.html 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Postage_VideoInset.png 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsScenesBackground.wmv 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Tripoli 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1276 wrote to memory of 1468 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 29 PID 1276 wrote to memory of 1468 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 29 PID 1276 wrote to memory of 1468 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 29 PID 1276 wrote to memory of 1468 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 29 PID 1276 wrote to memory of 520 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 30 PID 1276 wrote to memory of 520 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 30 PID 1276 wrote to memory of 520 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 30 PID 1276 wrote to memory of 520 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 30 PID 1276 wrote to memory of 928 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 31 PID 1276 wrote to memory of 928 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 31 PID 1276 wrote to memory of 928 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 31 PID 1276 wrote to memory of 928 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 31 PID 1276 wrote to memory of 1632 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 33 PID 1276 wrote to memory of 1632 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 33 PID 1276 wrote to memory of 1632 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 33 PID 1276 wrote to memory of 1632 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 33 PID 1276 wrote to memory of 1552 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 32 PID 1276 wrote to memory of 1552 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 32 PID 1276 wrote to memory of 1552 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 32 PID 1276 wrote to memory of 1552 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 32 PID 1276 wrote to memory of 1808 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 36 PID 1276 wrote to memory of 1808 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 36 PID 1276 wrote to memory of 1808 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 36 PID 1276 wrote to memory of 1808 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 36 PID 1276 wrote to memory of 112 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 38 PID 1276 wrote to memory of 112 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 38 PID 1276 wrote to memory of 112 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 38 PID 1276 wrote to memory of 112 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 38 PID 1808 wrote to memory of 1572 1808 net.exe 40 PID 1808 wrote to memory of 1572 1808 net.exe 40 PID 1808 wrote to memory of 1572 1808 net.exe 40 PID 1808 wrote to memory of 1572 1808 net.exe 40 PID 1276 wrote to memory of 1884 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 42 PID 1276 wrote to memory of 1884 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 42 PID 1276 wrote to memory of 1884 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 42 PID 1276 wrote to memory of 1884 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 42 PID 1276 wrote to memory of 1032 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 41 PID 1276 wrote to memory of 1032 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 41 PID 1276 wrote to memory of 1032 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 41 PID 1276 wrote to memory of 1032 1276 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe 41 PID 112 wrote to memory of 948 112 net.exe 45 PID 112 wrote to memory of 948 112 net.exe 45 PID 112 wrote to memory of 948 112 net.exe 45 PID 112 wrote to memory of 948 112 net.exe 45 PID 1884 wrote to memory of 1144 1884 net.exe 47 PID 1884 wrote to memory of 1144 1884 net.exe 47 PID 1884 wrote to memory of 1144 1884 net.exe 47 PID 1884 wrote to memory of 1144 1884 net.exe 47 PID 1032 wrote to memory of 1832 1032 net.exe 46 PID 1032 wrote to memory of 1832 1032 net.exe 46 PID 1032 wrote to memory of 1832 1032 net.exe 46 PID 1032 wrote to memory of 1832 1032 net.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe"C:\Users\Admin\AppData\Local\Temp\8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\1073r.exe"C:\Users\Admin\AppData\Local\Temp\1073r.exe" 9 REP2⤵
- Executes dropped EXE
PID:1468
-
-
C:\Users\Admin\AppData\Local\Temp\ATICfQfcDlan.exe"C:\Users\Admin\AppData\Local\Temp\ATICfQfcDlan.exe" 8 LAN2⤵
- Executes dropped EXE
PID:520
-
-
C:\Users\Admin\AppData\Local\Temp\OqdxPrOLTlan.exe"C:\Users\Admin\AppData\Local\Temp\OqdxPrOLTlan.exe" 8 LAN2⤵
- Executes dropped EXE
PID:928
-
-
C:\Windows\SysWOW64\icacls.exeicacls "D:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:1552
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:1632
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:1572
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:948
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:1832
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:1144
-
-